Abstract. We investigate the experimental effectiveness of query rewriting over XML security views. Our model consists of access control policies specified over DTDs with XPath e...
There is a need to develop methods to automatically incorporate prior knowledge to support the prediction and validation of novel functional associations. One such important sourc...
Francisco Azuaje, Haiying Wang, Huiru Zheng, Olivi...
We present a learning framework for structured support vector models in which boosting and bagging methods are used to construct ensemble models. We also propose a selection metho...
Hidden Markov Models (HMMs) are increasingly being used in computer vision for applications such as: gesture analysis, action recognition from video, and illumination modeling. Th...
Coarse-to-fine approaches use sequences of increasingly fine approximations to control the complexity of inference and learning. These techniques are often used in NLP and visio...